Fortinet Closes Acquisition of Meru Networks

Fortinet Closes Acquisition of Meru Networks

Source:: Fortinet

Fortinet to Announce Second Quarter 2015 Financial Results

Fortinet to Announce Second Quarter 2015 Financial Results

Source:: Fortinet

Fortinet to Announce Second Quarter 2015 Financial Results

Fortinet to Announce Second Quarter 2015 Financial Results

Source:: Fortinet

Vulnerability Spotlight: Apple Quicktime Corrupt stbl Atom Remote Code Execution

By Talos Group This post was authored by Rich Johnson , William Largent , and Ryan Pentney . Earl Carter contributed to this post. Cisco Talos, in conjunction with Apple’s security advisory issued on June 30th, is disclosing the discovery of a remote code execution vulnerability within Apple Quicktime. This vulnerability was initially discovered by the Talos Vulnerability Research & Development Team and reported in accordance with responsible disclosure policies to Apple. There is a remote code execution vulnerability in Apple Quicktime (TALOS-CAN-0018, CVE-2015-3667). An attacker who can control the data []

Source:: Cisco Security Notice

Vulnerability Spotlight: Apple Quicktime Corrupt stbl Atom Remote Code Execution

By Talos Group This post was authored by Rich Johnson , William Largent , and Ryan Pentney . Earl Carter contributed to this post. Cisco Talos, in conjunction with Apple’s security advisory issued on June 30th, is disclosing the discovery of a remote code execution vulnerability within Apple Quicktime. This vulnerability was initially discovered by the Talos Vulnerability Research & Development Team and reported in accordance with responsible disclosure policies to Apple. There is a remote code execution vulnerability in Apple Quicktime (TALOS-CAN-0018, CVE-2015-3667). An attacker who can control the data []

Source:: Cisco Security Notice

AMP Threat Grid integrates with Tripwire Enterprise

By Joe Malenfant Today’s threat landscape is completely different than last year; and next years will be, not surprisingly, even worse. The Industrialization of Hacking has spawned a new era of professional, entrepreneurial, and resourceful cyber criminals. In recent year’s dynamic malware analysis (aka sandboxing) has become the shiny new technology that we all want, no, need to have. At one time anti-virus held this position as well, and the same will eventually be said of sandbox technology used to fight advanced malware. []

Source:: Cisco Security Notice

AMP Threat Grid integrates with Tripwire Enterprise

By Joe Malenfant Today’s threat landscape is completely different than last year; and next years will be, not surprisingly, even worse. The Industrialization of Hacking has spawned a new era of professional, entrepreneurial, and resourceful cyber criminals. In recent year’s dynamic malware analysis (aka sandboxing) has become the shiny new technology that we all want, no, need to have. At one time anti-virus held this position as well, and the same will eventually be said of sandbox technology used to fight advanced malware. []

Source:: Cisco Security Notice

How to Land Yourself in A Dream Career in Cybersecurity

By Evelyn de Souza Last week I had the wonderful honor of being a presenter in the Cisco Networking Academy Find Yourself in The Future Series. To date this series has attracted over 9000 live attendees, which is testament to the extremely high levels of interest in technology careers in this region as well as the extraordinary efforts of the APAC marketing team. One figure blew me away in particular: 70% of attendees are interested in pursuing careers in cybersecurity. Cybersecurity is an incredibly exciting field. It draws in []

Source:: Cisco Security Notice